Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-01-2023 13:30
Static task
static1
Behavioral task
behavioral1
Sample
512fcd3048ecc3311759e82e00c9888d.exe
Resource
win7-20220812-en
General
-
Target
512fcd3048ecc3311759e82e00c9888d.exe
-
Size
262KB
-
MD5
512fcd3048ecc3311759e82e00c9888d
-
SHA1
be45965664140ed3a03236605f4b8c9ed7bfcc47
-
SHA256
b220568343b62f6a4bb4abc001ddfd4a00b66c9debe0542c55f6f2a91cd832bf
-
SHA512
1faac492c0a7fa1744c5a70b506d0b1d1e950c03b00e5a152bbe4a6ccb2237f6bb8ef6035839e1d976e1f228da2f0f1c1c4dec3d4f82bbc35659fe60e0625034
-
SSDEEP
6144:/Ya6Wa8RQeZcz5jHeU1NNWGYugdRUPmzDq9I+H:/YoaKcz5HeeNcGFgdRUGm95H
Malware Config
Extracted
formbook
u8ow
uzhDDUNgg10rOh8rkUMGYiLuNnRWl9gwMQ==
bfkA4IUaSgYi7IA=
ezX5yHeR21O3h2RCgQ==
x3E4ntHeLMGQm0kdTi6PJtjOVS6Em8UaKA==
xJuAYwcZLAfqrVazWjvkirgFxDSf
qrGugLdannLYegX5dCtFMA==
i61nMddueAYi7IA=
RoNMKNhtdDWpeiYoaB37TPiHTLo=
RFj3UHHrDtAktSZhYku36opnsaMbNA==
lx0g+6RPl4jwwNPRPuTD
MyEQ4oGk6vXrMM4V
0IVWH0rfKe1J4nn6J9XB
SYVlN3Zrnq2OaWpDiQ==
fNa0jy3P8KQK25rpmwqd0t8=
UZuSZpW+9ffX9KXzmgqd0t8=
Vxf85YCWvYNZjkcDdCtFMA==
0gG1EzLP7/DrMM4V
WExRGVAEE6YS5tJkTxMhR636+A==
6Tv7U4QdURt1KUI+gw==
ooR7RXgsXPtaEutnaQ3efjIXmfJePavzIA==
kH1+agwHHalYZx6qIgfY
ZWt1Rm0DSQlnBqPfWQAc/tcr
cLCK7t168nLRaWpDiQ==
mhlxXnj4ae2oyA==
cNfFjLnZBAbktB6qIgfY
e4+aeK07RtRvyDdIwbTJ
zV1cO+x+pG5zGpk=
Chw2HE2XGN4+Cr/5oYw2qDok
DP/jRm13vb2eiYBXkQ==
Ma9RHLrYBdejyIc/Mg2d/8xWIqM=
VTo6X4LaHCfge/wU
sWUqRFyEF4620a0t2n8=
gFcKdpXTkQzrMM4V
OhMDz+2HrUeaOs/fJBHkCKz7+g==
VO2d9iU2Thf318SIwq0EOA==
e1ku/6K39wfJUusrm0vPx4XRqHIvPpc=
P+jz1DwdYV0=
bTf6X4eNo29HFZaYHIdgOg==
4T4u2HphcHA0
tbfJk7tho2DrMM4V
mN6i/Su4QgqJXCqCRzW3mzJHyrWX
zW04ErzqFdmbu79Rig==
ZmprSnkJRcl0JKT6J9XB
MpWLW5et5BoKKk+rm3c=
Zr2aZxK7/FrlpnRYlw==
0U3tR3qhsDuRX0ebnn0=
wwHLoEjfITb8VSKpjXQ=
U0tVJVTjQAYi7IA=
UhwL8pe04L+OaWpDiQ==
aopHm8x6r2frMM4V
Lmst/p5BnbN6FIkTOM8rEdc=
GE06CTdjgx+Q6ZIV2H8=
EEj/aJNAfnLggR7q56O3833n8g==
iNu4mEHQ21YCng0d
KDEzCTXL1lu2jm76J9XB
75FOp9va+5X90pMaWzhMstYm
dC3913qn0YlNK0+rm3c=
JdWkeCE2aH5uMqzDQikE2IVmsaMbNA==
DXRpMVx9wYHolAeOVjsokL9HyrWX
OhHhPWGIz5DefU+rm3c=
50M3F7hrlnBBTDLKumo4nMY=
Fqq41ivP9XMLaTycqZUCOA==
711EHcp3p3EnLk+rm3c=
LT/fL08ENi0Gi1dYk4bzMQ==
majorcaplanetary.com
Extracted
xloader
3.0
u8ow
uzhDDUNgg10rOh8rkUMGYiLuNnRWl9gwMQ==
bfkA4IUaSgYi7IA=
ezX5yHeR21O3h2RCgQ==
x3E4ntHeLMGQm0kdTi6PJtjOVS6Em8UaKA==
xJuAYwcZLAfqrVazWjvkirgFxDSf
qrGugLdannLYegX5dCtFMA==
i61nMddueAYi7IA=
RoNMKNhtdDWpeiYoaB37TPiHTLo=
RFj3UHHrDtAktSZhYku36opnsaMbNA==
lx0g+6RPl4jwwNPRPuTD
MyEQ4oGk6vXrMM4V
0IVWH0rfKe1J4nn6J9XB
SYVlN3Zrnq2OaWpDiQ==
fNa0jy3P8KQK25rpmwqd0t8=
UZuSZpW+9ffX9KXzmgqd0t8=
Vxf85YCWvYNZjkcDdCtFMA==
0gG1EzLP7/DrMM4V
WExRGVAEE6YS5tJkTxMhR636+A==
6Tv7U4QdURt1KUI+gw==
ooR7RXgsXPtaEutnaQ3efjIXmfJePavzIA==
kH1+agwHHalYZx6qIgfY
ZWt1Rm0DSQlnBqPfWQAc/tcr
cLCK7t168nLRaWpDiQ==
mhlxXnj4ae2oyA==
cNfFjLnZBAbktB6qIgfY
e4+aeK07RtRvyDdIwbTJ
zV1cO+x+pG5zGpk=
Chw2HE2XGN4+Cr/5oYw2qDok
DP/jRm13vb2eiYBXkQ==
Ma9RHLrYBdejyIc/Mg2d/8xWIqM=
VTo6X4LaHCfge/wU
sWUqRFyEF4620a0t2n8=
gFcKdpXTkQzrMM4V
OhMDz+2HrUeaOs/fJBHkCKz7+g==
VO2d9iU2Thf318SIwq0EOA==
e1ku/6K39wfJUusrm0vPx4XRqHIvPpc=
P+jz1DwdYV0=
bTf6X4eNo29HFZaYHIdgOg==
4T4u2HphcHA0
tbfJk7tho2DrMM4V
mN6i/Su4QgqJXCqCRzW3mzJHyrWX
zW04ErzqFdmbu79Rig==
ZmprSnkJRcl0JKT6J9XB
MpWLW5et5BoKKk+rm3c=
Zr2aZxK7/FrlpnRYlw==
0U3tR3qhsDuRX0ebnn0=
wwHLoEjfITb8VSKpjXQ=
U0tVJVTjQAYi7IA=
UhwL8pe04L+OaWpDiQ==
aopHm8x6r2frMM4V
Lmst/p5BnbN6FIkTOM8rEdc=
GE06CTdjgx+Q6ZIV2H8=
EEj/aJNAfnLggR7q56O3833n8g==
iNu4mEHQ21YCng0d
KDEzCTXL1lu2jm76J9XB
75FOp9va+5X90pMaWzhMstYm
dC3913qn0YlNK0+rm3c=
JdWkeCE2aH5uMqzDQikE2IVmsaMbNA==
DXRpMVx9wYHolAeOVjsokL9HyrWX
OhHhPWGIz5DefU+rm3c=
50M3F7hrlnBBTDLKumo4nMY=
Fqq41ivP9XMLaTycqZUCOA==
711EHcp3p3EnLk+rm3c=
LT/fL08ENi0Gi1dYk4bzMQ==
majorcaplanetary.com
Signatures
-
Xloader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1716-66-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/1716-71-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/1656-75-0x0000000000070000-0x000000000009C000-memory.dmp xloader behavioral1/memory/1656-78-0x0000000000070000-0x000000000009C000-memory.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
cscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\YNUTDNC0H = "C:\\Program Files (x86)\\Altatq\\mfccbc.exe" cscript.exe -
Blocklisted process makes network request 2 IoCs
Processes:
cscript.exeflow pid process 9 1656 cscript.exe 22 1656 cscript.exe -
Executes dropped EXE 2 IoCs
Processes:
kmgzaumv.exekmgzaumv.exepid process 2036 kmgzaumv.exe 1716 kmgzaumv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
kmgzaumv.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\Geo\Nation kmgzaumv.exe -
Loads dropped DLL 3 IoCs
Processes:
512fcd3048ecc3311759e82e00c9888d.exekmgzaumv.exepid process 1376 512fcd3048ecc3311759e82e00c9888d.exe 1376 512fcd3048ecc3311759e82e00c9888d.exe 2036 kmgzaumv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
kmgzaumv.exekmgzaumv.execscript.exedescription pid process target process PID 2036 set thread context of 1716 2036 kmgzaumv.exe kmgzaumv.exe PID 1716 set thread context of 1260 1716 kmgzaumv.exe Explorer.EXE PID 1656 set thread context of 1260 1656 cscript.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
cscript.exedescription ioc process File opened for modification C:\Program Files (x86)\Altatq\mfccbc.exe cscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
cscript.exedescription ioc process Key created \Registry\User\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cscript.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
kmgzaumv.execscript.exepid process 1716 kmgzaumv.exe 1716 kmgzaumv.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
kmgzaumv.exekmgzaumv.execscript.exepid process 2036 kmgzaumv.exe 1716 kmgzaumv.exe 1716 kmgzaumv.exe 1716 kmgzaumv.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe 1656 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
kmgzaumv.execscript.exedescription pid process Token: SeDebugPrivilege 1716 kmgzaumv.exe Token: SeDebugPrivilege 1656 cscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1260 Explorer.EXE 1260 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1260 Explorer.EXE 1260 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
512fcd3048ecc3311759e82e00c9888d.exekmgzaumv.exeExplorer.EXEcscript.exedescription pid process target process PID 1376 wrote to memory of 2036 1376 512fcd3048ecc3311759e82e00c9888d.exe kmgzaumv.exe PID 1376 wrote to memory of 2036 1376 512fcd3048ecc3311759e82e00c9888d.exe kmgzaumv.exe PID 1376 wrote to memory of 2036 1376 512fcd3048ecc3311759e82e00c9888d.exe kmgzaumv.exe PID 1376 wrote to memory of 2036 1376 512fcd3048ecc3311759e82e00c9888d.exe kmgzaumv.exe PID 2036 wrote to memory of 1716 2036 kmgzaumv.exe kmgzaumv.exe PID 2036 wrote to memory of 1716 2036 kmgzaumv.exe kmgzaumv.exe PID 2036 wrote to memory of 1716 2036 kmgzaumv.exe kmgzaumv.exe PID 2036 wrote to memory of 1716 2036 kmgzaumv.exe kmgzaumv.exe PID 2036 wrote to memory of 1716 2036 kmgzaumv.exe kmgzaumv.exe PID 1260 wrote to memory of 1656 1260 Explorer.EXE cscript.exe PID 1260 wrote to memory of 1656 1260 Explorer.EXE cscript.exe PID 1260 wrote to memory of 1656 1260 Explorer.EXE cscript.exe PID 1260 wrote to memory of 1656 1260 Explorer.EXE cscript.exe PID 1656 wrote to memory of 536 1656 cscript.exe cmd.exe PID 1656 wrote to memory of 536 1656 cscript.exe cmd.exe PID 1656 wrote to memory of 536 1656 cscript.exe cmd.exe PID 1656 wrote to memory of 536 1656 cscript.exe cmd.exe PID 1656 wrote to memory of 636 1656 cscript.exe Firefox.exe PID 1656 wrote to memory of 636 1656 cscript.exe Firefox.exe PID 1656 wrote to memory of 636 1656 cscript.exe Firefox.exe PID 1656 wrote to memory of 636 1656 cscript.exe Firefox.exe PID 1656 wrote to memory of 636 1656 cscript.exe Firefox.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
cscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cscript.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\512fcd3048ecc3311759e82e00c9888d.exe"C:\Users\Admin\AppData\Local\Temp\512fcd3048ecc3311759e82e00c9888d.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe"C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe" C:\Users\Admin\AppData\Local\Temp\yaekxhsbqrp.x3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe"C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe"3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\jsgvegx.cFilesize
196KB
MD520d6ca878760712ccae7ba6d652506f5
SHA132ff1d2ccb8dc3d02cc1556d0382dc25966c0b78
SHA256730e5ed079f935a5bfae76720b726c0170acdb0ac0dcfef8385982b97dce7af3
SHA512c6bdce70c57fd175c71b044bd03bcf0baca356069518386cc732f65061c7b7d876459002916dc93111d5686b9e9a715d25c4ef11586767fbec092a8df4ce1988
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
C:\Users\Admin\AppData\Local\Temp\yaekxhsbqrp.xFilesize
5KB
MD55429138a957c0a88b28ff60b3a44167b
SHA155589112a809ccec8cd8a397dcdd5c8d25aaaf66
SHA25630cc7eb96bb55d2d4337ce8676140f235a7657ddab0532d81a3916adbb6378f0
SHA51215510bb15bc1980bd8468babefa596aa068fe0995db038a762533d0ceba2b18a1b64e3684b30d314efa2a9d9e4ea882b649d15681b0e1b0e69bcc7ee35628a70
-
\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
memory/536-72-0x0000000000000000-mapping.dmp
-
memory/1260-79-0x0000000004C90000-0x0000000004DE1000-memory.dmpFilesize
1.3MB
-
memory/1260-69-0x0000000004140000-0x0000000004211000-memory.dmpFilesize
836KB
-
memory/1260-77-0x0000000004C90000-0x0000000004DE1000-memory.dmpFilesize
1.3MB
-
memory/1376-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmpFilesize
8KB
-
memory/1656-73-0x00000000004D0000-0x00000000004F2000-memory.dmpFilesize
136KB
-
memory/1656-70-0x0000000000000000-mapping.dmp
-
memory/1656-74-0x0000000002120000-0x0000000002423000-memory.dmpFilesize
3.0MB
-
memory/1656-75-0x0000000000070000-0x000000000009C000-memory.dmpFilesize
176KB
-
memory/1656-76-0x0000000000500000-0x0000000000590000-memory.dmpFilesize
576KB
-
memory/1656-78-0x0000000000070000-0x000000000009C000-memory.dmpFilesize
176KB
-
memory/1716-68-0x0000000000480000-0x0000000000491000-memory.dmpFilesize
68KB
-
memory/1716-71-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1716-67-0x0000000000740000-0x0000000000A43000-memory.dmpFilesize
3.0MB
-
memory/1716-66-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1716-64-0x0000000000420000-mapping.dmp
-
memory/2036-57-0x0000000000000000-mapping.dmp